Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyung-suk Lhee is active.

Publication


Featured researches published by Kyung-suk Lhee.


advanced data mining and applications | 2006

A comprehensive categorization of DDoS attack and DDoS defense techniques

Usman Tariq; Manpyo Hong; Kyung-suk Lhee

Distributed Denial of Service (DDoS) attack is the greatest security fear for IT managers. With in no time, thousands of vulnerable computers can flood victim website by choking legitimate traffic. Several specific security measurements are deployed to encounter DDoS problem. Instead of specific solution, a comprehensive DDoS cure is needed which can combat against the previously and upcoming DDoS attack vulnerabilities. Development of such solution requires understanding of all those aspects which can help hacker to activate zombies and launch DDoS attack. In this paper, we comprehensively analyzed the DDoS problem and we proposed a simplified taxonomy to categorize the attack scope and available defense solutions. This taxonomy can help the software developers and security practitioners to understand the common vulnerabilities that encourage the attackers to launch DDoS attack.


acm symposium on applied computing | 2010

Fast file-type identification

Irfan Ahmed; Kyung-suk Lhee; Hyunjung Shin; Manpyo Hong

This paper proposes two techniques to reduce the classification time of content-based file type identification. The first is a feature selection technique, which uses a subset of highly-occurring byte patterns in building the representative model of a file type and classifying files. The second is a content sampling technique, which uses a subset of file content in obtaining its byte-frequency distribution. Our initial experiments show that the proposed approaches are promising even the simple 1-gram features are used for the classification.


australasian conference on information security and privacy | 2009

On Improving the Accuracy and Performance of Content-Based File Type Identification

Irfan Ahmed; Kyung-suk Lhee; Hyunjung Shin; Manpyo Hong

Types of files (text, executables, Jpeg images, etc.) can be identified through file extension, magic number, or other header information in the file. However, they are easy to be tampered or corrupted so cannot be trusted as secure ways to identify file types.In the presence of adversaries, analyzing the file content may be a more reliable way to identify file types, but existing approaches of file type analysis still need to be improved in terms of accuracy and speed. Most of them use byte-frequency distribution as a feature in building a representative model of a file type, and apply a distance metric to compare the model with byte-frequency distribution of the file in question. Mahalanobis distance is the most popular distance metric. In this paper, we propose 1) the cosine similarity as a better metric than Mahalanobis distance in terms of classification accuracy, smaller model size, and faster detection rate, and 2) a new type-identification scheme that applies recursive steps to identify types of files. We compare the cosine similarity to Mahalanobis distance using Wei-Hen Li et al.s single and multi-centroid modeling techniques, which showed 4.8% and 13.10% improvement in classification accuracy (single and multi-centroid respectively). The cosine similarity showed reduction of the model size by about 90% and improvement in the detection speed by 11%. Our proposed type identification scheme showed 37.78% and 31.47% improvement over Wei-Hen Lis single and multi-centroid modeling techniques respectively.


international conference on digital forensics | 2011

Fast content-based file type identification

Irfan Ahmed; Kyung-suk Lhee; Hyunjung Shin; Manpyo Hong

Digital forensic examiners often need to identify the type of a file or file fragment based on the content of the file. Content-based file type identification schemes typically use a byte frequency distribution with statistical machine learning to classify file types. Most algorithms analyze the entire file content to obtain the byte frequency distribution, a technique that is inefficient and time consuming. This paper proposes two techniques for reducing the classification time. The first technique selects a subset of features based on the frequency of occurrence. The second speeds up classification by randomly sampling file blocks. Experimental results demonstrate that up to a fifteen-fold reduction in computational time can be achieved with limited impact on accuracy.


Journal of Computer Virology and Hacking Techniques | 2011

Classification of packet contents for malware detection

Irfan Ahmed; Kyung-suk Lhee

Many existing schemes for malware detection are signature-based. Although they can effectively detect known malwares, they cannot detect variants of known malwares or new ones. Most network servers do not expect executable code in their in-bound network traffic, such as on-line shopping malls, Picasa, Youtube, Blogger, etc. Therefore, such network applications can be protected from malware infection by monitoring their ports to see if incoming packets contain any executable contents. This paper proposes a content-classification scheme that identifies executable content in incoming packets. The proposed scheme analyzes the packet payload in two steps. It first analyzes the packet payload to see if it contains multimedia-type data (such as


Iete Technical Review | 2010

Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach

Irfan Ahmed; Kyung-suk Lhee; Hyunjung Shin; Manpyo Hong


network and parallel computing | 2007

Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration

Ali Hammad Akbar; Mustafa Hasan; Ki-Hyung Kim; Kyung-suk Lhee; Ayesha Naureen; H.F. Ahmed

{{\tt avi, wmv, jpg})}


availability, reliability and security | 2008

Detection of Malcodes by Packet Classification

Irfan Ahmed; Kyung-suk Lhee


information assurance and security | 2007

Binding Update Authentication Scheme for Mobile IPv6

Irfan Ahmed; Usman Tariq; Shoaib Mukhtar; Kyung-suk Lhee; S.W. Yoo; Piao Yanji; Manpyo Hong

. If not, then it classifies the payload either as text-type (such as


pakistan section multitopic conference | 2005

PMS an expeditious marking scheme to combat with the DDoS attack

Usman Tariq; Manpyo Hong; Kyung-suk Lhee

Collaboration


Dive into the Kyung-suk Lhee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Irfan Ahmed

University of New Orleans

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge